According to Sanjay Joshi (internet marketer) article, Remote desktop protocol in simple terms is a proprietary tool, which belongs to Microsoft and is also distributed by authorized partners. This protocol allows the user of Microsoft windows server to interact with another computer using the same graphics or operating system. It provides remote display and input capabilities across widespread network connections where the windows based applications are running on a server.

Multiple LAN protocols can be supported by the RDP instruments. Usually all the RDP works on and are based on ITU T.120 family of protocols. This protocol allows for separate virtual channels for carrying device communication and presentation data from the server. Also, these protocols are spread across encrypted servers and data.

The windows RDP is specialist of an extensible base and supports up to 64,000 separate channels for transmission of data. The rdp has the potential to use its own video driver to construct its own information pockets along the network and lets them pass to the client computers. It is because of the RDP that the commands from the mouse and keyboards reach the server which is read through the Microsoft windows graphics device interface.

The simplest formats of the windows RDP applicability are the enabling and disabling the color combinations and the wallpaper, through the TCP connection. It is the wide range of RDP features that has brought so many of enthusiasts to take advantage of remote desktop protocol.

Encryption is the most important and the top of the list feature. Due to the encryption over a secure communications across networks, many administrators are choosing the windows desktop protocol. The data can be reduced by the help of the RDP by data compression, persistent caching of bitmaps and fragments in RAM.

The lower cache provides a substantial lowering of the bandwidth at which the windows system can work. The ability to connect or disconnect from a remote device is a functionality that is possible and is perhaps the most attractive feature of the RDP. This is particularly advantageous when the sudden logging off occurs. Users have the advantage of deleting, copying and pasting text and graphics between applications running on the local or remote computers.

Applications running within a remote desktop can be printed on a printer that is fixed to the client computer. The remote desktop protocol has allowed the client device to develop new and augmented applications and new features can be added. With the help of remote desktop protocol, remote management of different computers is possible.

Sharing inputs and displaying graphics between two different remote desktops can be done which allows the support staff to diagnose and resolve a problem from a remote location. Lastly, the remote connection can be used to shed of the excessive load due to the networking. These are the features that can be implemented and taken advantage of by the use of RDP. Those clients, who are able to do this, can resolve a number of issues that pertain to the computer use. And all these without the need to be physically present near the computer.

Best Windows Server 2016 Hosting Recommendation

ASPHostPortal.com provides our customers with Plesk Panel, one of the most popular and stable control panels for Windows hosting, as free. You could also see the latest .NET framework, a crazy amount of functionality as well as Large disk space, bandwidth, MSSQL databases and more. All those give people the convenience to build up a powerful site in Windows server 2016. We offers Windows hosting starts from $5/month only. We also guarantees 30 days money back and guarantee 99.9% uptime. If you need a reliable affordable Windows server 2016 Hosting, we should be your best choice.

Windows Server Backup is a unique feature that enables regular backups and recovery solutions for computers running Windows Server 2008. The new backup and recovery technology was introduced to replace the previous NTBackup feature that was in earlier Windows versions. This program automatically performs back up operations for critical data and can also be used to restore the data for supported applications. In fact, the backup feature can be used for backing up a full Server or selected volumes according to user's needs.

With this server backup, it is easy to manage disasters when they occur. This is possible through recovery options for backed up volumes, folders, files, applications or even system state. A system recovery using Server Backup program can restore a complete server to a new hard drive in case of disk volume failures. This can be done using the full Windows recovery environment. Besides local computers, this new Backup also supports creation and management of backups for remote computers.

The server backup solution is an appropriate feature not only for system administrators but for anyone who needs backup solutions. It is suitable for small businesses as well as large companies. In fact, you do not need to be an IT professional to use new this new backup program. It is actually suited for individuals with basic computer skills especially in data recovery and backup. Technically, Windows Server Backup also provides APIs for cloud integration.

To run this program, you have to be in the group of administrators or Backup operators as a special consideration. Using the MMC (Microsoft Management Console) snap-in, you can actually manage the backups of another computer with Windows Server Backup. However, since the firewall is enabled by default in Windows 2008, you might encounter several security issues in the process. Luckily, these issues can be resolved by making relevant changes in the firewall. With these exciting new features included in this feature Backup program, it becomes much easier to perform and manage data recovery operations in a convenient manner; its few drawbacks outlined below notwithstanding.

One drawback with Windows 2008 is that current users of previous versions of Windows Server cannot upgrade old settings to the new Windows Server Backup feature. These settings have to be reconfigured after running an upgrade. A separate and dedicated disk is also required for running scheduled backups. Moreover, backing up data on tape is no longer supported in Server program and only locally attached disks can be backed up. To recover data from backups created with previous Server versions, you have to install NTBackup for Windows Server 2008.

With its faster backup technology, the backup software is a convenient and versatile backup tool in Windows server 2008. Restoration of items is much simpler as you can selectively choose what to restore. Backups can also be scheduled to run automatically without any user input. One-time backups can be performed to complement the automatic backups. With cloud integration, cloud backups can be synchronized with local backups through the MMC snap-in in Server Backup solution.

Best Windows Server 2012 Hosting Recommendation

ASPHostPortal.com provides our customers with Plesk Panel, one of the most popular and stable control panels for Windows hosting, as free. You could also see the latest .NET framework, a crazy amount of functionality as well as Large disk space, bandwidth, MSSQL databases and more. All those give people the convenience to build up a powerful site in Windows server 2012. We offers Windows hosting starts from $5/month only. We also guarantees 30 days money back and guarantee 99.9% uptime. If you need a reliable affordable Windows server 2012 Hosting, we should be your best choice.

IPAM is an entirely new feature in Windows Server 2012 that provides highly customizable administrative and monitoring capabilities for the IP address on a corporate network infrastructure or IPAM is the new framework for finding , monitoring and managing it on a network .

IPAM is a feature of Windows Server 2012 and must be installed as such , either by using the Add Roles and Features Wizard or through PowerShell 3.0 and poorly documented in my opinion , making a useful feature harder to use and understand than it should be .

Even without formal organization IPAM applications keep track of their IP address information somehow - most typically in spreadsheets . IPAM lets you view IP address availability and configuration from a database perspective , enabling you to use your addresses more efficiently . IPAM features such as IP reconciliation and automation can Eliminate the need to use spreadsheets for tracking addresses .

IPAM is performed on a Microsoft network by an installable feature of Windows Server 2012 that you run on a domain member server to " watch and centrally manage " the other servers on your network that are actually doing the work . IPAM manages the functionality of the following Windows servers :

DHCP Service

DNS Server

Network Policy Server ( NPS )

Active Directory Domain Controller ( DC )

To do import IPAM , IPAM log on to your server and open Server Manager :

Click IPAM in far left pane of Server Manager .

In the IPAM client , select IP Address Blocks under IP ADDRESS SPACE , and the make sure that Current view is set to IP Addresses in the drop - down menu .

If you look along the top window , you will see the IP address listed along the top fields , such as IP Address and IP Address State . You can add or remove fields by right-clicking on one of the existing fields .

If you want to import and Assignment Type yhis information , you need to add these fields to the first line of your import file , without spaces , as shown below :

Alternatively , you can keep the spaces in the field names and enclose with quotation marks , for example , " IP Address" and " IP Address State " . The actual IP address of the data should then follow , comma delimited in the same order that you specified the fields as shown above .

Some fields , such as IP Address State , will require you to look and see what the options are valid input . To find out what the possible options are :

Click Tasks in the far right corner of this client and select Add IP Address from the menu .

Select the drop - down menu by the side of the field to see the possible options. For instance , the field can be set to In - Use , Inactive or Reserved .

Now we need to change the status of any discovered servers to Managed . To do this , right click a server in the Server Inventory screen and select Edit Server from the menu .

In the Add or Edit Server window , change the Manageability status to Managed and click OK . Right click the server again , and select Retrieve All Data Server from the menu . Repeat this procedure for all discovered servers . Now you are ready to add the IP addresses , ranges and blocks to IPAM .

Windows Server 2012 Essentials does not come with Microsoft Exchange Server as its predecessor Small Business Server 2011 did. However, many small businesses still use a copier or multifunction device that has the ability to scan to email. Some units also allow a fax to email forwarding service. Unfortunately, many of these devices rely on some form of internal SMTP service to enable them to relay emails to recipients.

Fortunately, you can enable a SMTP service that is built into the core operating system for Windows Server 2012. Here how to do this.

Install the SMTP Service

Launch the Server Manager. From the Search charm, type in Server Manager to find it.

From the Dashboard, Add Roles and Features. The Add Roles and Features Wizard will begin. Click Next on the first screen.

Select Role-based or feature-based installation.

Select the Essentials Server (which should be highlighted by default).

Click Next to bypass the Roles selections.

Scroll down the list and tick the SMTP Server feature.

A new window will pop up to inform you that some other services will also be installed. Click Add Features to confirm and continue. Click Next to continue past the features selection screen.

Click Install to complete the Installation.

Click Close when the installation has completed.

Configure the SMTP Service

From the Search charm, type IIS. Hover your mouse over one of the selections, and run the Internet Information Services (IIS) 6.0 Manager.

Click Yes to the UAC Prompt.

Expand to SMTP Virtual Server #1, right click and select Properties.

General Tab: Set the IP Address to the server’s IP address.

Note: You can also enable logging is required.

Access Tab: Set the IP for the internal devices in the connection button.

Add the same IP to the Relay list.

Delivery Tab: Set an external domain – you can use the free customised domain from Microsoft, and you can also optionally add a Smart host, if required. Tick the Attempt direct delivery box, if you want the server to attempt to deliver the email directly first before trying the Smart host.

From the Search charm, type Firewall to locate and run the Windows Firewall with Advanced Security console.

Add a new Inbound Rule. (Right Click on Inbound Rule, and select New Rule)

Select Port.

Type in 25 as the local port.

Click Next (Allow the Connection).

Uncheck Public. (Prevents external access to the server)

Give the rule a name, and click Finish to create the rule.

You should now see a new rule enabled in the firewall management console.

Restart the SMTP Service and set the service for Automatic Start. Open up the Services Management Console. Double Click on the Simple Mail Transfer Protocol service. Stop and then Start the service. Set the Startup type to Automatic.

Do you know what is Dynamic Access Control?? Microsoft Dynamic Access Control (DAC) is a data governance tool in Windows Server 2012 that lets administrators control access settings. DAC uses centralized policies to let administrators review who has access to individual files. Files can be manually or automatically classified.

Windows Server 2012 Dynamic Access Control basically organize information automatically on file servers in order to meet business needs and regulatory requirements .

With the use of technology in the DAC classification , organization or company can identify or provide " tags " or labels to files on the file server . This capability to control access to files that were tagged through centralized access policies , perform audits and related reporting events related to access or attempts to access , use RMS ( Rights Management Services ) to encrypt Office documents so that the documents safe when the data out of the file server .

A number of the features found in Windows Server 2012 that are beneficial to the administrator in this regard :

File owner , or the owner can directly provide information " tags " or labels to their own information , so do not need to be done by the administrator .

Apply to the central access policy files ( information ) that has been in the " tag " or label given

Provide " access denied remediation " when the user can not access the information .

Configure the central audit trail records policies for information access ( access logs ) that can later be used for analysis and forensic needs .

Protect certain sensitive information to the protection of the RMS automatically.

Label or tag used to identify the protected file can be used to classify files in logic . In Windows Server 2012 , this label can be applied in four ways :

Based on location . When files are stored on a file server , the file inherits the label of its parent folder .

Manually . Users and administrators can manually file labeling .

Automatic . Files can be automatically labeled based on content or other characteristics .

With the application , using the API for labeling file maintained by the application .

Windows Server introduces a slew of new technologies. These technologies enable Windows Server systems and virtual environments to meet all manner of new requirements and scenarios, including private and public cloud implementations. Often, this type of scenario involves a single infrastructure that's shared by different business units or even different organizations.

In this article, I want to describe Network virtualization. Other great capabilities include a new site-to-site VPN solution; huge enhancements to the Server Message Block (SMB) protocol, enabling VMs to run from a Server 8 file share; native NIC teaming; and consistent device naming. But I want to focus on the major network technologies that most affect virtualization.

Virtualization has always striven to abstract one resource layer from another, giving improved functionality and portability. But networking hasn't embraced this goal, and VMs are tied to the networking configuration on the host that runs them. Microsoft System Center Virtual Machine Manager (VMM) 2012 tries to link VMs to physical networks through its logical networks feature, which lets you create logical networks such as Development, Production, and Backup. You can then create IP subnets and virtual LANs (VLANs) for each physical location that has a connection to a logical network. This capability lets you create VMs that automatically connect to the Production network, for example; VMM works out the actual Hyper-V switch that should be used and the IP scheme and VLAN tag, based on the actual location to which the VM is deployed.

This feature is great. But it still doesn't help in scenarios in which I might be hosting multiple tenants that require their own IP schemes, or even one tenant that requires VMs to move between different locations or between private and public clouds, without changing IP addresses or policies that relate to the network. Typically, public cloud providers require clients to use the hosted IP scheme, which is an issue for flexible migration between on-premises and off-premises hosting.

Both these scenarios require the network to be virtualized, and the virtual network must believe that it wholly owns the network fabric, in the same way that a VM believes it owns the hardware on which it runs. VMs don't see other VMs, and virtual networks shouldn't see or care about other virtual networks on the same physical fabric, even when they have overlapping IP schemes. Network isolation is a crucial part of network virtualization, especially when you consider hosted scenarios. If I'm hosting Pepsi and Coca-Cola on the same physical infrastructure, I need to be very sure that they can't see each other's virtual networks. They need complete network isolation.

This virtual network capability is enabled through the use of two IP addresses for each VM and a virtual subnet identifier that indicates the virtual network to which a particular VM belongs. The first IP address is the standard address that's configured within the VM and is referred to as the customer address (using IEEE terms). The second IP address is the address that the VM communicates over the physical network and is known as the provider address.

In the example that Figure 1 shows, we have one physical fabric. Running on that fabric are two separate organizations: red and blue. Each organization has its own IP scheme, which can overlap, and the virtual networks can span multiple physical locations. Each VM that is part of the virtual red or blue network has its own customer address. A separate provider address is used to send the actual IP traffic over the physical fabric.

Figure 1: Virtual networking example

You can see that the physical fabric has the network and compute resources and that multiple VMs run across the hosts and sites. The color of the VM coordinates with its virtual network (red or blue). Even though the VMs are distributed across hosts and locations, the hosts in the virtual networks are completely isolated from the other virtual networks with their own IP schemes.

Two solutions-IP rewrite and Generic Routing Encapsulation (GRE)-enable network virtualization in Server 8. Both solutions allow completely separate virtual networks with their own IP schemes (which can overlap) to run over one shared fabric.

IP rewrite. The first option is IP rewrite, which does exactly what the name suggests. Each VM has two IP addresses: a customer address, which is configured within the VM, and a provider address, which is used for the actual packet transmission over the network. The Hyper-V switch looks at the traffic that the VM is sending out, looks at the virtual subnet ID to identify the correct virtual network, and rewrites the IP address source and target from the customer addresses to the corresponding provider addresses. This approach requires many IP addresses from the provider address pool because every VM needs its own provider address. The good news is that because the IP packet isn't being modified (apart from the address), hardware offloads such as virtual machine queue (VMQ), checksum, and receive-side scaling (RSS) continue to function. IP rewrite adds very little overhead to the network process and gives very high performance.

Figure 2 shows the IP rewrite process, along with the mapping table that the Hyper-V host maintains. The Hyper-V host maintains the mapping of customer-to-provider addresses, each of which is unique for each VM. The source and destination IP addresses of the original packet are changed as the packet is sent via the Hyper-V switch. The arrows in the figure show the flow of IP traffic.

Figure 2: IP rewrite process

GRE. The second option is GRE, an Internet Engineering Task Force (IETF) standard. GRE wraps the originating packet, which uses the customer addresses, inside a packet that can be routed on the physical network by using the provider address and that includes the actual virtual subnet ID. Because the virtual subnet ID is included in the wrapper packet, VMs don't require their own provider addresses. The receiving host can identify the targeted VM based on the target customer address within the original packet and the virtual subnet ID in the wrapper packet. All the Hyper-V host on the originating VM needs to know is which Hyper-V host is running the target VM and can send the packet over the network.

The use of a shared provider address means that far fewer IP addresses from the provider IP pools are needed. This is good news for IP management and the network infrastructure. However, there is a downside, at least as of this writing. Because the original packet is wrapped inside the GRE packet, any kind of NIC offloading will break. The offloads won't understand the new packet format. The good news is that many major hardware manufacturers are in the process of adding support for GRE to all their network equipment, enabling offloading even when GRE is used.

Figure 3 shows the GRE process. The Hyper-V host still maintains the mapping of customer-to-provider address, but this time the provider address is per Hyper-V host virtual switch. The original packet is unchanged. Rather, the packet is wrapped in the GRE packet as it passes through the Hyper-V switch, which includes the correct source and destination provider addresses in addition to the virtual subnet ID.

Figure 3: GRE

In both technologies, virtualization policies are used between all the Hyper-V hosts that participate in a specific virtual network. These policies enable the routing of the customer address across the physical fabric and track the customer-to-provider address mapping. The virtualization policies can also define the virtual networks that are allowed to communicate with other virtual networks. The virtualization policies can be configured by using Windows PowerShell, which is a common direction for Server 8. This makes sense: When you consider massive scale and automation, the current GUI really isn't sufficient. The challenge when using native PowerShell commands is the synchronous orchestration of the virtual-network configuration across all participating Hyper-V hosts.

Both options sound great, but which one should you use? GRE should be the network virtualization technology of choice because it's faster than IP rewrite. The network hardware supports GRE, which is important because otherwise GRE would break offloading, and software would need to perform offloading, which would be very slow. Also, because of the reduced provider address requirements, GRE places fewer burdens on the network infrastructure. However, until the networking equipment supports GRE, you should use IP rewrite, which requires no changes on the network infrastructure equipment.

About ASPHostPortal.com

We’re a company that works differently to most. Value is what we output and help our customers achieve, not how much money we put in the bank. It’s not because we are altruistic. It’s based on an even simpler principle. "Do good things, and good things will come to you".

Success for us is something that is continually experienced, not something that is reached. For us it is all about the experience – more than the journey. Life is a continual experience. We see the Internet as being an incredible amplifier to the experience of life for all of us. It can help humanity come together to explode in knowledge exploration and discussion. It is continual enlightenment of new ideas, experiences, and passions